OpManager | July 17, 2019OpManager bags gold—listed in Feedspot's top networking blogs and sites to follow in 2019Great news! The OpManager blog has ranked #15 in Feedspot's top 100 networking blogs and websites to follow. This is a particularly big deal for...
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacksIn a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities allow administrators...
ADSelfService Plus | July 16, 2019Complying with NIST password guidelinesPasswords are the most widely used form of authentication across the globe and serve as the first line of...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security featuresPart two and part three of this blog series gave a detailed look at Log360's in-depth auditing capabilities,...
Mobile Device Manager Plus | July 12, 2019Agent Smith materializes from the matrix of Android malwareThere’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate...
Patch Manager Plus | July 10, 2019Microsoft Patch Tuesday July 2019: Six publicly disclosed vulnerabilities, two zero-day flawsThe much awaited Microsoft Patch Tuesday updates for July 2019 are here. If you're a...
Log360 | July 8, 2019Five reasons to choose Log360, part 3: Comprehensive network auditingIn the previous post, we discussed the various environments that Log360 helps you audit...
General | July 5, 2019Five worthy reads: Educating the education sector on cybersecurityFive worthy reads is a regular column on five noteworthy items we’ve discovered while...
RecoveryManager Plus | July 5, 2019Why litigation holds are not a viable alternative to backupsMicrosoft does not provide backup and recovery tools for its Office 365 services and has...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accountsIn a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...